CVE-2020-5858Improper Privilege Management in F5 Big-ip Access Policy Manager

Severity
7.8HIGHNVD
EPSS
0.2%
top 55.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 27
Latest updateMay 24

Description

On BIG-IP 15.0.0-15.0.1.2, 14.1.0-14.1.2.2, 13.1.0-13.1.3.2, 12.1.0-12.1.5, and 11.5.2-11.6.5.1 and BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, users with non-administrator roles (for example, Guest or Resource Administrator) with tmsh shell access can execute arbitrary commands with elevated privilege via a crafted tmsh command.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages14 packages

NVDf5/big-ip_access_policy_manager11.5.211.6.5+4
NVDf5/big-ip_analytics11.5.211.6.5+4
NVDf5/big-ip_edge_gateway11.5.211.6.5+4
NVDf5/big-ip_webaccelerator11.5.211.6.5+4
NVDf5/big-ip_link_controller11.5.211.6.5+4

🔴Vulnerability Details

2
GHSA
GHSA-6mmq-35g9-989q: On BIG-IP 152022-05-24
CVEList
CVE-2020-5858: On BIG-IP 152020-03-27

📋Vendor Advisories

1
F5
CVE-2020-5858: On BIG-IP 152020-03-27
CVE-2020-5858 — Improper Privilege Management in F5 | cvebase